General Cyber Flashcards
(44 cards)
What is Encapsulation
The process of protocol information being added to data as it moves through the OSI model layers! Done via the form of a header
What is a firewall
A security device that can be applied to a network.
Placed at perimeter of the network to filter inbound and outbound traffic by using predefined rules
Can be software or dedicated hardware
Spoofing
When a device pretends to be another device in a network
This can be done through actions from attackers spoofing an IP or MAC address
What is a ACPO
Association of Chief of Police Officers
Created a set of guidelines for forensic investigators to be compliant with forensically sound processes
What is de-capsulation
During encapsulation process, protocol information being added is added to data; the de-capsulation process removes this info once the data is recorded at the corresponding layer on the destination computer.
What’s a proxy ?
A device that can be added to the perimeter of a network which handles requests from clients by disguising the address/identity of the client in the internal network.
What does DDOS stand for
Distributed Denial of Service attack
What is a DDOS attack?
An attack where a large amount of packets are sent to a single device to overload the device and render it inoperable
The digital forensic process
Incident response, managing digital evidence, preparing forensic documentation.
It’s a scientific process that is repeatable and verifiable.
What’s a switch
A networking device used in a LAN to direct internal traffic.
Works at layer 2
Helps to break up collision domains
Utilises Physical MAC addresses in order to direct and forward traffic
What is Authentication
Ensuring that an effective individual or device is in fact who they are claiming to be
Ethical hacking steps
Reconnaissance
Scanning and enumeration
Vulnerability analysis
Gaining access
Escalating privileges
Maintaining access
Covering tracks
Incident response
The actions carried out in response to a cyber crime - securing the crime scene and identifying evidence
What is a router
A layer 3 device that carries out path determination and packet forwarding of network packets.
Traffic can’t move to an external network without passing through the router first.
Uses IP addressing in order to direct traffic.
What are the main biometrics used
Fingerprints, iris, face and voice
A method to identifying a user due to physical characteristics that they have
Social engineering
Used by attackers to trick users into giving out sensitive info that can assist in an attack on a system wether it’s physical or digital
Steps for managing digital evidence
Acquiring digital evidence
Chain of custody
Processing evidence
Analysing evidence
The actions carried out during an investigation
What are the 7 layers of a OSI Model
1.Physical
2. Data-link
3. Network
4. Transport
5. Session
6. Presentation
7. Application
What is the OSI model
Open system interconnection model. A conceptual model that aids in understanding the process of packet traversing over a network
What is Encryption
The process of changing data from plain text to a cypher text so a unauthorised user cannot read the data
What is the Recon stage of Ethical hacking
Stage 1. Gathering information relating to the target system this can be done passively or actively persuing
How to prepare forensic documentation
At the end of digi forensics investigations, there’s a number of pieces of documentation that are produced, including ;
A report documenting all actions, findings and justifications
Contemporaneous notes as well as documentation regarding the chain of custody.
What is simplex?
Simplex is the context of network communication, it refers to one way communication
What is the CIA
The cia triad is the foundational principles of data security
Confidentiality - data is not accessible via permission
Integrity - data should remain intact and not be manipulated
Availability - data should be secure, but should also be available to those who have permission to access whenever required